Skip to main content
Log in

Finding critical blocks of information diffusion in social networks

  • Published:
World Wide Web Aims and scope Submit manuscript

Abstract

The diffusion of information is taking place every place and every time over the Internet. The widely used web applications of online social networks, have many benefits to serve as a medium for fast, widespread information diffusion platforms. While there are substantial works on how to maximize the diffusion of useful information, there are many misinformation diffusing on social networks. How to control the misinformation diffusing efficiently with the smallest cost is still a big challenge. We tackle this challenge by reducing the problem to finding the critical blocks. The critical blocks are the sets of nodes that partition the whole network evenly at a small cost, and we believe they play a key role during the process of diffusion, and the nodes in critical blocks have advantages to span different communities in some social networks too. We prove such problem of finding critical blocks is NP-complete and therefore an exact solution is infeasible to get. A simple but effective solution is proposed by the following steps: first we convert a social network graph into a Laplacian matrix, then we compute its Fiedler Vector, which has been proved to have good properties, with the help of Fiedler Vector, we develop some heuristic algorithms to find critical blocks. We perform lots of experiments both on synthetic data, real world datasets from Twitter and coauthor networks from DBLP, the experimental results show that our algorithm is effective and efficient both on synthetic data and real world data. And we demonstrate a case analysis as an anecdotal evidence to show there do exist critical blocks in social networks and our algorithm can find them effectively and efficiently.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Aggarwal, C.C., et al: Social Network Data Analytics. Springer, Germany (2011)

    Book  MATH  Google Scholar 

  2. Ahuja, G.: Collaboration networks, structural holes, and innovation: a longitudinal study. Administrative Science Quarterly 45, 425–455 (2000)

    Google Scholar 

  3. Bapat, R.B.: Graphs and Matrices. Springer, Germany (2011)

    MATH  Google Scholar 

  4. Barabasi, A.L., Albert, R.: Emergence of scaling in random networks. Scinece 509(286) (1999)

  5. Borgatti, S.P., Mehra, A., Brass, D.J., Labianca, G.: Network analysis in the social sciences. Science 323(5916), 892–895 (2009)

    Article  Google Scholar 

  6. Budak, C., Agrawal, D., Abbadi, A.: Limiting the spread of misinformation in social networks. In: WWW ’11: International World Wide Web Conference, pp. 497–505. ACM (2011)

  7. Burt, R.: Structural holes: The Social Structure of Competition. Harvard University Press, Cambridge (1992)

    Google Scholar 

  8. Buskens, V., van de Rijt, A.: Dynamics of networks if everyone strives for structural hole. Am. J. Sociol. 114(2), 371–407 (2008)

    Article  Google Scholar 

  9. Chen, W., Wang, C., Wang, Y.: Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1029–1038. ACM (2010)

  10. Chung, F.: Spectral graph theory. Number 92 in CBMS Regional Conference Series in Mathematics, Febraryt (1997)

  11. Dhillon, I., Guan, Y., Kulis, B.: Kernel k-means: spectral clustering and normalized cuts. In: KDD ’04: International Conference on Knowledge Discovery and Data Mining, pp. 551–556. ACM (2004)

  12. Fiedler, M.: Algebraic connectivity of graphs. Czechoslov. Math. J. 23(98) (1973)

  13. Fiedler, M.: A property of enginvectors of nonnegative symmetric matrices and its application to graph theory. Czechoslov. Math. J. 25(100), 619–633 (1975)

    MathSciNet  Google Scholar 

  14. Garey, M.R., Johnson, D.S.: Computers and intractability: a guide to the theory of NP-Completeness. Bell Telephone Laboratories (1979)

  15. Grime, R.G., Lewis, J.G., Simon, H.D.: A shifted block lanczos algorithm for solving sparse symmetric generalized eigenproblems. SIAM J. Matrix Anal. Appl. 15(1), 228–272 (1992)

    Article  Google Scholar 

  16. Golub, G.H., Loan, C.F.V.: Matrix Computations, 3rd edn. Johns Hopkins University Press, USA (1996)

    Google Scholar 

  17. Gomez-Rodriguez, M., Leskovec, J., Krause, A.: Inferring networks of diffusion and influence. In: KDD ’10: International Conference on Knowledge Discovery and Data Mining, pp. 1019–1028. ACM (2010)

  18. Goyal, S., Vega-Redondo, F.: Structural holes in social networks. J. Econ. Theory 137(1), 460–492 (2007)

    Article  MATH  MathSciNet  Google Scholar 

  19. Goyal, A., Bonchi, F., Lakshmanan, L.V.S.: A data-based approach to social influence maximization. In: VLDB: Proceedings of the VLDB Endowment, pp. 73–84. ACM (2012)

  20. Hagen, L., Kahng, A.B.: New spectral methods for ratio cut partitioning and clustering. IEEE Trans. Comput. Aided Des. 19(2) (1992)

  21. Kargar, M., An, A.: Discovering top-k teams of experts with/without a leader in social networks. In: CIKM 11: Conference on Information and Knowledge Management, pp. 985–994. ACM (2011)

  22. Kempe, D., Kleinberg, J.M., Tardos, E.: Maximizing the spread of influence through a social network. In: International Conference on Knowledge Discovery and Data Mining. ACM (2003)

  23. Kleinberg, J., Suri, S., Tardos, E.: Strategic network formation with structural holes. In: EC ’08: ACM Conference on Electronic Commerce. ACM (2008)

  24. Lappas, T., Liu, K., Terzi, E.: Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data mining, pp. 467–476. ACM (2009)

  25. Leskovec, J., Backstrom, L., Kleinberg, J.: Meme-tracking and the dynamics of the news cycle. In: KDD ’07: International Conference on Knowledge Discovery and Data Mining, pp. 497–505. ACM (2007)

  26. Leskovec, J., Krause, A., Guestrin, C., et al: Cost-effective outbreak detection in network. In: KDD ’07: International Conference on Knowledge Discovery and Data Mining, pp. 420–429. ACM (2007)

  27. Manguoglu, M.: A highly efficient parallel algorithm for computing the fiedler vector. CoRR, abs/1003.3689 (2010)

  28. Morozov, E.: Swine flu: Twitter’s power to misinformation. Foreign policy (2009)

  29. Ng, A.Y., Jordan, M.I., Weiss, Y.: On spectral clustreing: analysis and an algorithm. In: NIPS ’01: Advances in Neural Information Processing Systems. ACM (2001)

  30. Pinto, P.C., Thiran, P., Vetterli, M.: Locating the source of diffusion in large-scale networks. Phys. Rev. Lett.Week ending 10 August 2012, PRL 109, 068702. doi:10.1103/PhysRevLett.109.068702 (2012)

  31. Sameh, A., Tong, Z.: The trace minimization method for the symmetric generalized eigenvalue problem. J. Comput. Appl. Math. 123(1–2), 155–175 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  32. Shi, J., Malik, J.: Normalized cuts and image segmentation. IEEE Trans. Pattern. Anal. Mach. Intell. 22(8) (2000)

  33. Thakar, J., Christensen, C., Albert, R.: Toward understanding the structure and function of cellular interaction networks. Handbook of Large-Scale Random Networks. Springer, Germany (2008)

    Google Scholar 

  34. von Luxburg, U.: A tutorial on spectral clustering. Stat. Comput. 17(4) (2007)

  35. Wasserman, S., Faust, K.: Social Network Analysis. Cambridge University Press, England (1994)

    Book  Google Scholar 

  36. Watts, D.J., Strogatz, S.: Collective dynamics of small-world networks. Nature 393(6684), 440–442 (1998)

    Article  Google Scholar 

  37. Wu, K., Simon, H.: Thick-restart lanczos method for large symmetric eigenvalue problems. SIAM J. Matrix Anal. Appl. 22(2), 602–616 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  38. Zafarani, R., Liu, H.: Social Computing Data Repository at ASU. http://socialcomputing.asu.edu, Arizona State University, School of Computing, Informatics and Decision Systems Engineering (2009)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ende Zhang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Zhang, E., Wang, G., Gao, K. et al. Finding critical blocks of information diffusion in social networks. World Wide Web 18, 731–747 (2015). https://doi.org/10.1007/s11280-013-0271-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11280-013-0271-z

Keywords

Navigation